scientific article; zbMATH DE number 1759775
From MaRDI portal
Publication:4536798
zbMath0989.94505MaRDI QIDQ4536798
Bernd Meyer, Ingrid Biehl, Volker Müller
Publication date: 6 August 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Quantum lattice enumeration and tweaking discrete pruning ⋮ A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) ⋮ Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm ⋮ White-box ECDSA: challenges and existing solutions ⋮ Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA ⋮ Fault attacks on hyperelliptic curve discrete logarithm problem over binary field ⋮ All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks ⋮ Analysis of the fault attack ECDLP over prime field ⋮ Fault Attacks on Public Key Elements: Application to DLP-Based Schemes ⋮ Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Differential fault attack on Montgomery ladder and in the presence of scalar randomization ⋮ Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) ⋮ Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures ⋮ Fault analysis of the NTRUSign digital signature scheme ⋮ Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography ⋮ Towards practical key exchange from ordinary isogeny graphs ⋮ Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round ⋮ Fault-based attack on Montgomery's ladder algorithm ⋮ Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje ⋮ Lattice-Based Fault Attacks Against ECMQV ⋮ Unnamed Item ⋮ Elliptic curve cryptosystems in the presence of permanent and transient faults ⋮ White-box cryptography: don't forget about grey-box attacks ⋮ Differential fault analysis of AES: toward reducing number of faults ⋮ Protecting ECC against fault attacks: the ring extension method revisited ⋮ General Fault Attacks on Multivariate Public Key Cryptosystems ⋮ Efficient Algorithms for Supersingular Isogeny Diffie-Hellman ⋮ A Brief History of Pairings
This page was built for publication: